97 lines
3.6 KiB
Markdown
97 lines
3.6 KiB
Markdown
# Neutrino physics 101
|
|
## Table of Contents
|
|
* [Malware analysis](#Malware-analysis)
|
|
+ [The initial vector](#Initial)
|
|
+ [Loader](#loader)
|
|
* [Threat Intelligence](#Intel)
|
|
+ [](#Sub_Intel)
|
|
* [Cyber kill chain](#Cyber-kill-chain)
|
|
* [Indicators Of Compromise (IOC)](#IOC)
|
|
* [Yara Rules](#Yara)
|
|
* [References MITRE ATT&CK Matrix](#Ref-MITRE-ATTACK)
|
|
* [Links](#Links)
|
|
+ [Original Tweet](#tweet)
|
|
+ [Link Anyrun](#Links-Anyrun)
|
|
+ [Ressources](#Ressources)
|
|
|
|
<h2>Malware analysis <a name="Malware-analysis"></a></h2>
|
|
<h3>The initial vector<a name="Initial"></a></h3>
|
|
|
|
<h6>The initial vector is an malicious document using a macro. As the first look, we can note some constant variables can be replace and deletefor improvement the reading of the code.</h6>
|
|
|
|
``` VBA
|
|
|
|
Private Const HHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHOneMask = 16515072
|
|
Private Const HHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHTwoMask = 258048
|
|
Private Const HHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHThreeMask = 4032
|
|
Private Const HHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHFourMask = 63
|
|
|
|
Private Const HHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHighMask = 16711680
|
|
Private Const HHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHMidMask = 65280
|
|
Private Const HHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHLowMask = 255
|
|
|
|
Private Const MNAJSAQQQQQQ18 = 262144
|
|
Private Const MNAJSAQQQQQQ12 = 4096
|
|
Private Const MNAJSAQQQQQQ6 = 64
|
|
Private Const MNAJSAQQQQQQ8 = 256
|
|
Private Const MNAJSAQQQQQQ16 = 65536
|
|
|
|
```
|
|
|
|
<h6> We can see the both functions for auto-open the macro in the reading of the document for the Word and Excel document. This is for a common code for the both vectors or for reduce the rate of the detection, hard to say it.</h6>
|
|
|
|
``` VBA
|
|
Sub AutoOpen()
|
|
AddSpace
|
|
End Sub
|
|
|
|
Private Sub Workbook_Open()
|
|
AddSpace
|
|
End Sub
|
|
```
|
|
|
|
</li>
|
|
<p align="center">
|
|
<img src="">
|
|
</p>
|
|
<p align="center">
|
|
|
|
|
|
<h2>Threat Intelligence</h2><a name="Intel"></a></h2>
|
|
|
|
<h2> Cyber kill chain <a name="Cyber-kill-chain"></a></h2>
|
|
<h6>The process graph resume cyber kill chains used by the attacker :</h6>
|
|
<p align="center">
|
|
<img src="https://raw.githubusercontent.com/StrangerealIntel/CyberThreatIntel/master/Additional%20Analysis/Neutrino/Pictures/cyberkill.PNG">
|
|
</p>
|
|
<h2> Indicators Of Compromise (IOC) <a name="IOC"></a></h2>
|
|
<h6> List of all the Indicators Of Compromise (IOC)</h6>
|
|
|
|
|Indicator|Description|
|
|
| ------------- |:-------------:|
|
|
|
|
<h6> The IOC can be exported in <a href="">JSON</a></h6>
|
|
|
|
<h2> References MITRE ATT&CK Matrix <a name="Ref-MITRE-ATTACK"></a></h2>
|
|
|
|
|Enterprise tactics|Technics used|Ref URL|
|
|
| :---------------: |:-------------| :------------- |
|
|
|
|
<h6> This can be exported as JSON format <a href=""></a></h6>
|
|
<h2>Yara Rules<a name="Yara"></a></h2>
|
|
<h6> YARA Rules are available <a href="">here</a></h6>
|
|
<h2>Links <a name="Links"></a></h2>
|
|
<h6> Original tweet: </h6><a name="tweet"></a>
|
|
|
|
* [https://twitter.com/JAMESWT_MHT/status/1225796259845414912](https://twitter.com/JAMESWT_MHT/status/1225796259845414912)
|
|
|
|
<h6> Links Anyrun: <a name="Links-Anyrun"></a></h6>
|
|
|
|
* [impor.doc](https://app.any.run/tasks/454fe6a2-e2d0-4fa3-ba1d-78e2c7372ddd)
|
|
|
|
<h6> Resources : </h6><a name="Ressources"></a>
|
|
* [Encode64 / Decode64 in VB.NET](https://stackoverflow.com/questions/12879661/encode64-decode64-in-vb-net)
|
|
* [New Neutrino Bot comes in a protective loader](https://blog.malwarebytes.com/threat-analysis/2017/02/new-neutrino-bot-comes-in-a-protective-loader/)
|
|
* [URLhaus Neutrino](https://urlhaus.abuse.ch/browse/tag/Neutrino/)
|
|
* [VB2019 paper: Rich Headers: leveraging this mysterious artifact of the PE format](https://www.virusbulletin.com/virusbulletin/2020/01/vb2019-paper-rich-headers-leveraging-mysterious-artifact-pe-format/)
|